New features or enhancements
More detailed information is available in the New Features Guide.
Feature ID |
Description |
---|---|
727383 |
Add GUI support for IPv6 addresses in Internet Service Database (ISDB), and allow them to be configured in firewall policies. |
749989 |
FortiGates, FortiSwitches, FortiAPs, and FortiExtenders can download an EOS (end of support) package automatically from FortiGuard during the bootup process or by using manual commands. Based on the downloaded EOS package files, when a device passes the EOS date, a warning message is displayed in the device's tooltip, and the device is highlighted in the GUI. The End-of-Support security rating check rule audits the EOS of FortiGates and Fabric devices. This allows administrators to have clear visibility of their Security Fabric, and help prevent any security gaps or vulnerabilities that may arise due to any devices that are past their hardware EOS date. |
753177 |
Display IoT devices with known vulnerabilities on the Security Fabric > Asset Identity Center page's Asset list view. Hovering over the vulnerabilities count displays a View IoT Vulnerabilities tooltip, which opens the View IoT Vulnerabilities table that includes the Vulnerability ID, Type, Severity, Reference, Description, and Patch Signature ID. Each entry in the Reference column includes the CVE number and a link to the CVE details. The Security Fabric > Security Rating > Security Posture report includes FortiGuard IoT Detection Subscription and FortiGuard IoT Vulnerability checks. The FortiGuard IoT Detection Subscription rating check will pass if the System > FortiGuard page shows that the IoT Detection Service is licensed. The FortiGuard IoT Vulnerability rating check will fail if any IoT vulnerabilities are found. To detect IoT vulnerabilities, the FortiGate must have a valid IoT Detection Service license, device detection must be configured on a LAN interface used by IoT devices, and a firewall policy with an application control sensor must be configured. |
766158 |
Introduce a multi-tiered approach to determining the action taken on a video. The channel filter is checked first, and if the video's channel matches a configuration entry, the corresponding action is taken. If not, the FortiGuard category filter is checked and the corresponding action is taken if the video's category matches a configuration entry. If neither of these conditions are met, the default action specified in the video filter profile is used. Logging is also enabled by default. config videofilter profile edit <name> set default-action {allow | monitor | block} set log {enable | disable} next end |
767570 |
Add the Fabric Overlay Orchestrator, which is an easy-to-use GUI wizard within FortiOS that simplifies the process of configuring a self-orchestrated SD-WAN overlay within a single Security Fabric without requiring additional tools or licensing. Currently, the Fabric Overlay Orchestrator supports a single hub architecture and builds upon an existing Security Fabric configuration. This feature configures the root FortiGate as the SD-WAN overlay hub and configures the downstream FortiGates (first-level children) as the spokes. After configuring the Fabric Overlay, you can proceed to complete the SD-WAN deployment configuration by configuring SD-WAN rules. |
769722 |
Allow a managed FortiSwitch ID to be edited and store the device serial number as a new read-only field. config switch-controller managed-switch edit <id> set sn <serial_number> next end The device ID can be configured to a maximum of 16 alphanumeric characters, including dashes (-) and underscores (_). Some related |
780571 |
Add Logs Sent Daily chart for remote logging sources (FortiAnalyzer, FortiGate Cloud, and FortiAnalyzer Cloud) to the Logging & Analytics Fabric Connector card within the Security Fabric > Fabric Connectors page and to the Dashboard as a widget for a selected remote logging source. |
805867 |
Increase the number of supported NAC devices to 48 times the maximum number of FortiSwitch units supported on that FortiGate model. |
812329 |
Support DVLAN mode 802.1ad and 802.1Q on NP7 platforms over a virtual wire pair, which provides better performance and packet processing. |
812993 |
Support the blocking of a discovered FortiExtender device on a FortiGate configured as a FortiExtender controller using Reject Status in the GUI and config extension-controller extender edit <name> set id <string> set authorized disable next end |
819508 |
A FortiGate can allow single sign-on (SSO) from FortiCloud and FortiCloud IAM users with administrator profiles inherited from FortiCloud or overridden locally by the FortiGate. Similarly, users accessing the FortiGate remotely from FortiGate Cloud can have their permissions inherited or overridden by the FortiGate. |
819583 |
Add guards to Node.JS log generation and move logs to # diagnose nodejs logs {list | show <arg> | show-all | delete <arg>} |
827464 |
The FortiGate device ID is carried by the IKEv2 message NOTIFY payload when it is configured. config vpn ipsec phase1-interface edit <name> set dev-id-notification enable set dev-id <string> next end This device ID configuration is required when the FortiGate is configured as a secure edge LAN extension for FortiSASE, and allows FortiSASE to distribute IKE/IPsec traffic according to the FortiGate device ID to achieve load balancing. |
829478 |
Improve replacement message displayed for YouTube videos blocked by video filtering. When a user visits a video directly by URL, a full-page replacement message is displayed. When a user loads a video from YouTube, the page will load but the replacement message will display in the video frame. |
836287 |
Support adding YAML to the file name when backing up the config as YAML, and detecting file format when restoring the configuration. The In the GUI, the File format field has been removed from the Restore system Configuration page. |
836653 |
On FortiGates licensed for hyperscale firewall features, the following commands display summary information for IPv4 or IPv6 hardware sessions. # diagnose sys npu-session list-brief # diagnose sys npu-session list-brief6 |
838363 |
Internet Service Database (ISDB) on-demand mode replaces the full-sized ISDB file with a much smaller file that is downloaded onto the flash drive. This file contains only the essential entries for Internet Services. When a service is used in a firewall policy, the FortiGate queries FortiGuard to download the IP addresses and stores them on the flash drive. The FortiGate also queries the local MAC Database (MADB) for corresponding MAC information. config system global set internet-service-database on-demand end |
839877 |
FortiPolicy can be added to the Security Fabric. When FortiPolicy joins the Security Fabric and is authorized in the Security Fabric widget, it appears in the Fabric topology pages. A FortiGate can grant permission to FortiPolicy to perform firewall address and policy changes. Two security rating tests for FortiPolicy have been added to the Security Posture scorecard. |
849515 |
Add config vpn ipsec phase1-interface edit <name> set auto-discovery-crossover {allow | block} next end When
When
When
|
849771 |
Support Shielded and Confidential VM modes on GCP where the UEFI VM image is used for secure boot, and data in use is encrypted during processing. |
854704 |
FortiGate VMs with eight or more vCPUs can be configured to have a minimum of eight cores to be eligible to run the full extended database (DB). Any FortiGate VM with less than eight cores will receive a slim version of the extended DB. This slim-extended DB is a smaller version of the full extended DB, and it is designed for customers who prefer performance. |
855520 |
Harden REST API and GUI access. |
855561 |
Use API endpoint domain name from instance metadata to support FortiOS VM OCI DRCC region. |
855684 |
Allow users to configure the RADIUS NAS-ID as a custom ID or the hostname. When deploying a wireless network with WPA-Enterprise and RADIUS authentication, or using the RADIUS MAC authentication feature, the FortiGate can use the custom NAS-ID in its Access-Request. config user radius edit <name> set nas-id-type {legacy | custom | hostname} set nas-id <string> next end |
858786 |
When configuring a CGN IP pool for a hyperscale firewall, exclude IP addresses within this IP pool from being used for source NAT ( config firewall ippool edit <name> set type cgn-resource-allocation set startip <IPv4_address> set endip <IPv4_address> set excludeip <IPv4_address>, <IPv4_address>, <IPv4_address> ... next end This option is currently not supported with a fixed allocation CGN IP pool (when |
860965 |
Support the AWS T4g instance family with the FG-ARM64-AWS firmware image. Support the AWS C6a and C6in instance families with the FG-VM64-AWS firmware image. |
866174 |
The config wireless-controller wtp-profile edit <name> config radio-1 set optional-antenna {none | FANT-04ABGN-0606-O-R | FANT-04ABGN-0606-P-R} end next end |
868163 |
Implement real-time file system integrity checking in order to:
|
868164 |
Implement BIOS-level signature and file integrity checking by enforcing each FortiOS GA firmware image, AV engine files, and IPS engine files to be dually-signed by the Fortinet CA and a third-party CA. The BIOS verifies that each file matches their secure hash as indicated by their certificates. Users are warned when there is a failed integrity check, and the system may be prevented from booting depending on the severity and the BIOS security level. |
868592 |
Support Saudi Cloud Computing Company (SCCC) and alibabacloud.sa domain (a standalone cloud backed by AliCloud). |
869198 |
Make the health check sensitive enough to detect small amounts of packet loss by decreasing the link monitor check interval and probe timeout minimum limit down to 20 ms, which will significantly impact VOD/voice. |
881186 |
Support deploying VMware FortiGate VMs directly as a Zero Trust Application Gateway using the OVF template (.vapp). ZTNA related parameters such as EMS server, external and internal interface IPs, and application server mapping can be configured during OVF deployment. ZTNA policies, authentication schemes, rules, and user groups are also bootstrapped. |
894191 |
Improve GUI memory consumption for FortiGates with 2 GB of RAM or less. |
901576 |
Simplify BLE iBeacon provisioning whereby the BLE major ID can be set in WTP and WTP group settings (in addition to being set in the BLE profile settings), and the BLE minor ID can be set in the WTP settings (in addition to being set in the BLE profile settings). config wireless-controller wtp edit <id> set ble-major-id <integer> set ble-minor-id <integer> next end config wireless-controller wtp-group edit <name> set ble-major-id <integer> set wtps <wtp-id1>, <wtp-id2>, ... next end The BLE major ID defined in the WTP settings overrides the BLE major ID defined in the WTP group settings and the BLE major ID defined in the BLE profile settings. The BLE major ID defined in the WTP group settings overrides the BLE major ID defined in the BLE profile settings. The BLE minor ID defined in the WTP settings overrides the BLE minor ID defined in the BLE profile settings. |